CVE-2026-21511
Analyzed
Analyzed - Analysis Complete
Deserialization Vulnerability in Microsoft Outlook Enables Network Spoofing
Publication date: 2026-02-10
Last updated on: 2026-02-11
Assigner: Microsoft Corporation
Description
Description
Deserialization of untrusted data in Microsoft Office Outlook allows an unauthorized attacker to perform spoofing over a network.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| microsoft | sharepoint_server | 2019 |
| microsoft | sharepoint_server | 2016 |
| microsoft | 365_apps | * |
| microsoft | 365_apps | * |
| microsoft | office_long_term_servicing_channel | 2021 |
| microsoft | office | 2019 |
| microsoft | office | 2019 |
| microsoft | word | 2016 |
| microsoft | word | 2016 |
| microsoft | office_long_term_servicing_channel | 2024 |
| microsoft | office_long_term_servicing_channel | 2021 |
| microsoft | office_long_term_servicing_channel | 2021 |
| microsoft | office_long_term_servicing_channel | 2024 |
| microsoft | office_long_term_servicing_channel | 2024 |
| microsoft | sharepoint_server | to 16.0.19127.20518 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-502 | The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the deserialization of untrusted data in Microsoft Office Outlook. It allows an unauthorized attacker to perform spoofing over a network.
How can this vulnerability impact me? :
The impact of this vulnerability is spoofing, which means an attacker can impersonate another user or entity over a network. This can lead to deception and potentially unauthorized actions or information disclosure.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70